Static task
static1
Behavioral task
behavioral1
Sample
41a3c218838f9b88e7cb0c8f0961d911_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
41a3c218838f9b88e7cb0c8f0961d911_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
41a3c218838f9b88e7cb0c8f0961d911_JaffaCakes118
-
Size
622KB
-
MD5
41a3c218838f9b88e7cb0c8f0961d911
-
SHA1
4ac311ed06771e9dcd5c8e3a446d4202a5497297
-
SHA256
e82fa5109d4fccc9ce8545e7d1acc80503cf7476078f21972f8e4eb83903b560
-
SHA512
4fac7f90af1e99f06b2ccbb07d8f2e987b34cddb7a8aff56200c2a78cb13e72b8fd3e4eb7f43bc8c737371752e12d3c578df4076cde4895a78395a2a7e86ced3
-
SSDEEP
6144:siTh0VoMOSQfoyE4zXec3SS+dNVioEIUmUxrZbcq1JozNHejems5NMGCksKVuM62:siIoMOZbE4jSS+d7+bx5DoNHl8M68
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41a3c218838f9b88e7cb0c8f0961d911_JaffaCakes118
Files
-
41a3c218838f9b88e7cb0c8f0961d911_JaffaCakes118.exe windows:5 windows x86 arch:x86
368cba6523f23ed7d259d14f5f876c3f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
MulDiv
OutputDebugStringA
QueryPerformanceCounter
RemoveDirectoryW
SearchPathW
SetCurrentDirectoryW
SetErrorMode
SetFileAttributesW
LocalAlloc
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
lstrcatW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
LoadLibraryW
LoadLibraryA
InterlockedIncrement
InterlockedDecrement
GlobalFree
GlobalAlloc
GetWindowsDirectoryW
GetVersionExW
GetTickCount
GetSystemTimeAsFileTime
GetSystemDirectoryW
GetProcAddress
GetPrivateProfileStringW
GetPrivateProfileIntW
GetModuleHandleA
GetModuleFileNameW
GetLastError
GetFileAttributesW
GetExitCodeThread
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetCurrentDirectoryW
GetCommandLineW
FreeLibrary
FormatMessageW
FindNextFileW
FindFirstFileW
FindClose
ExitProcess
DeleteFileW
CreateProcessW
CreateFileMappingW
CloseHandle
CreateFileW
GetModuleHandleW
SetLastError
VirtualAlloc
user32
GetWindowRect
GetWindowTextW
InflateRect
InvalidateRect
IsChild
IsDlgButtonChecked
IsRectEmpty
IsWindowEnabled
IsWindowVisible
LoadAcceleratorsW
LoadCursorW
LoadImageW
LoadStringA
LoadStringW
MapWindowPoints
MessageBeep
MessageBoxW
MoveWindow
MsgWaitForMultipleObjects
OffsetRect
PeekMessageW
PostMessageW
PostQuitMessage
RedrawWindow
RegisterClassExW
RegisterClassW
ReleaseDC
SendDlgItemMessageW
SendMessageW
SetCursor
SetFocus
SetForegroundWindow
SetMessageQueue
SetWindowLongW
SetWindowPos
SetWindowTextW
ShowWindow
TranslateAcceleratorW
TranslateMessage
UnregisterClassW
UpdateWindow
WaitMessage
wsprintfW
GetWindowLongW
GetWindow
GetUpdateRect
GetSystemMetrics
GetSysColorBrush
GetSysColor
GetNextDlgTabItem
GetMessageW
GetLastActivePopup
GetFocus
GetDlgItem
GetDlgCtrlID
GetDesktopWindow
GetDC
GetClientRect
GetClassInfoW
FindWindowW
FillRect
ExitWindowsEx
EnumThreadWindows
EnumChildWindows
EndPaint
EndDialog
EnableWindow
DrawTextW
DrawIcon
DrawFocusRect
DrawEdge
DispatchMessageW
DialogBoxParamW
DestroyWindow
DefWindowProcW
CreateWindowExW
CreateDialogParamW
CopyRect
CheckRadioButton
CheckDlgButton
CharPrevW
CharNextW
CallWindowProcW
BringWindowToTop
BeginPaint
LoadBitmapW
SendMessageA
LoadIconW
GetParent
gdi32
StretchBlt
SetTextColor
SetMapMode
SetBkMode
SetBkColor
SelectObject
GetTextMetricsW
GetStockObject
GetObjectW
GetMapMode
GetDeviceCaps
DeleteObject
DeleteDC
CreatePatternBrush
CreateFontIndirectW
CreateCompatibleDC
CreateCompatibleBitmap
CreateBitmap
BitBlt
AddFontResourceA
GetBkColor
DPtoLP
advapi32
RegQueryValueExA
RegSetValueExW
RegQueryValueW
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyExA
RegDeleteValueW
RegCreateKeyW
RegCreateKeyExW
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegOpenKeyW
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetMalloc
ShellExecuteW
ole32
CoInitialize
CoUninitialize
CoCreateInstance
shlwapi
PathIsURLW
PathIsFileSpecW
msvcrt
_wsplitpath
swscanf
setlocale
memmove
_except_handler3
_vsnwprintf
_wmakepath
_wtoi
free
malloc
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rwu0 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 575KB - Virtual size: 575KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ